A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing

Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley indepen...

Full description

Bibliographic Details
Main Authors: Ibrahim Ozbek, Fatih Temiz, Irfan Siap
Format: Article
Language:English
Published: Yildiz Technical University 2019-09-01
Series:Journal of Algebra Combinatorics Discrete Structures and Applications
Online Access:http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303
id doaj-83cfddd531de4a6faef18799d15b30a9
record_format Article
spelling doaj-83cfddd531de4a6faef18799d15b30a92020-11-25T01:10:24ZengYildiz Technical UniversityJournal of Algebra Combinatorics Discrete Structures and Applications2148-838X2019-09-0163124A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharingIbrahim OzbekFatih TemizIrfan SiapSecret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley independently. After these initial studies, Asmuth-Bloom and Mignotte have proposed a different $(k,n)$ threshold modular secret sharing scheme by using the Chinese remainder theorem. In this study, we explore the generalization of Mignotte's scheme to Euclidean domains for which we obtain some promising results. Next, we propose new algorithms to construct threshold secret image sharing schemes by using Mignotte's scheme over polynomial rings. Finally, we compare our proposed scheme to the existing ones and we show that this new method is more efficient and it has higher security.http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303
collection DOAJ
language English
format Article
sources DOAJ
author Ibrahim Ozbek
Fatih Temiz
Irfan Siap
spellingShingle Ibrahim Ozbek
Fatih Temiz
Irfan Siap
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
Journal of Algebra Combinatorics Discrete Structures and Applications
author_facet Ibrahim Ozbek
Fatih Temiz
Irfan Siap
author_sort Ibrahim Ozbek
title A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
title_short A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
title_full A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
title_fullStr A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
title_full_unstemmed A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
title_sort generalization of the mignotte's scheme over euclidean domains and applications to secret image sharing
publisher Yildiz Technical University
series Journal of Algebra Combinatorics Discrete Structures and Applications
issn 2148-838X
publishDate 2019-09-01
description Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley independently. After these initial studies, Asmuth-Bloom and Mignotte have proposed a different $(k,n)$ threshold modular secret sharing scheme by using the Chinese remainder theorem. In this study, we explore the generalization of Mignotte's scheme to Euclidean domains for which we obtain some promising results. Next, we propose new algorithms to construct threshold secret image sharing schemes by using Mignotte's scheme over polynomial rings. Finally, we compare our proposed scheme to the existing ones and we show that this new method is more efficient and it has higher security.
url http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303
work_keys_str_mv AT ibrahimozbek ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
AT fatihtemiz ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
AT irfansiap ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
AT ibrahimozbek generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
AT fatihtemiz generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
AT irfansiap generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing
_version_ 1725174937471156224